You are on page 1of 9

Q.No.

1: Marketing Strategies on Web:


Explore strategies and techniques that you can use on the Internet that will enhance and support your business's overall marketing objectives. Learn how to conduct banner promotions, generate targeted online traffic, positioning your content, and over all brand awareness. Many librarians focus their marketing energy and time around promotional activities including advertising, special events, publicity, and brand awareness. But in todays world, marketing managers need to have Web strategies and techniques as part of their library marketing plans. Web technologies are a disruptive force thats changing the way that messages about products and brands are delivered and received. The rise of social media powered by Web is a dramatic change for marketing just as the printing press was for communications. Wikipedia defines social media as the online tools and platforms that people use to share opinions, insights, experiences, and perspectives with each other. Internet marketing can attract more people to your website, increase customers for your business, and enhance branding of your company and products. If you are just beginning your online marketing strategy the top 10 list below will get you started on a plan that has worked for many. Types of internet marketing strategies and how to plan one Many of you start an online business with the expectation of earning huge profit without even realizing that you should build an internet marketing strategy in order to achieve a place in the global markets. Read on to know about different online marketing strategies and how you can plan one in order to advertise your products and services online. How to plan an internet marketing strategy In order to develop an internet marketing strategy, at first you need to determine who your target customers are. Then, you need to decide whether youll offer your own or sell someone elses product and service. It is also quite important to decide the competitive advantage of the product that youre planning to offer. You can follow these steps in order to develop a unique online marketing strategy. Research online: You need to do an online research to find out what strategies are employed by your competitors. It will help you to analyze their strengths and weaknesses as youll have to target what theyre not able to offer. You need to search how you can advertise your product to your target customers. Therefore, you need to find out what the main concerns of your target customers are and where they usually visit in order to find the products. Develop a strategy: Online research will help you to decide what to offer so as to attract your target visitors to your website and then turning them to customers. Make sure you calculate how much you can afford. You need to use an internet marketing strategy according to your affordability.

You can check out the following section to know about different online marketing strategies. Types of online marketing strategies Here are 4 internet marketing strategies that will help you to advertise your product and service online.

Search Engine Optimization Using appropriate keywords and Meta tags to increase the visibility of your webpage in the results page of the popular search engines. Example:

Affiliate marketing Displaying your banner in other websites through which the potential customers are redirected to your website. You need to give a share of your profit to the affiliate marketers Example:

Social marketing Signing up on social network websites (such as, Twitter, Facebook, etc.), and using their services to attract your potential customers. You can also participate in online forums to promote your product. Business directory listings Adding your business to appropriate directory listings. However, you need to be a member of the particular business group if you want to list your business in their website. Example:

Your task doesnt end only by developing a suitable strategy. You need to monitor your internet marketing strategy to make sure that you are getting the results, that is, youre able to advertise your product and service to your target customers. This in turn, will help you to achieve a significant place in the global markets thus making your business profitable for you.

Q.No.2:
Mobile Banking: Mobile banking is a way for the customer to perform banking actions on his or her cell phone or other mobile device. It is a quite popular method of banking that fits in well with a busy, technologically oriented lifestyle. It might also be referred to as M-banking or SMS banking. The amount of banking you are able to do on your cell phone varies depending on the banking institution you use. Some banks offer only the option of text alerts, which are messages sent to your cell phone that alert you to activity on your account such as deposits, withdrawals, and ATM or credit card use. This is the most basic type of mobile banking. A more involved type of mobile banking allows the user to log into his or her account from a cell phone, and then use the phone to make payments, check balances, transfer money between

accounts, notify the bank of a lost or stolen credit card, stop payment on a check, receive a new PIN, or view a monthly statement, among other transactions. This type of banking is meant to be more convenient for the consumer than having to physically go into a bank, log on from their home computer, or make a phone call. While all of this is true, some are concerned about the security of mobile banking. Most experts advise against performing any large transactions over mobile banking, which is good advice. However, it is equally important to use an alphanumeric password and to keep your PIN safe. Change your password often, and do not use your pets' names, your child's name, or any birthdays. This advice applies to all passwords, not just those used for mobile banking. Though you are logging on to a secure server at the bank through your cell phone, you need to do your part to protect your information. For this reason, many banks are now sending one-time use passwords for an extra step in security. A one-time use password might be sent to a cell phone or other device when you wish to log into your account. You will then usually need to enter both the password you have already set, along with the one-time use password, within a certain period of time. The one-time use password expires, naturally, after it is used once or after a time limit has passed. Using two passwords increases the security of the account, an important concern with mobile banking.

Practices for Mobile Banking Secure your device: Create a strong password for your mobile device that is easy to remember, but hard to guess. Don't use common words, names, birthdays or any personal information in your password. Use your device's auto-lock feature. We recommend you set your auto-lock to take effect 5 minutes from the last activity. Don't share your device with others. Since you can't set separate passwords on your mobile device, like you can when logging into computers, its best not to share your device with anyone.

Back up and protect your data: Back up your data regularly. We recommend syncing your mobile device with your computer. Delete any text messages or emails that contain sensitive information. We recommend that you never disclose sensitive, personal information about yourself via a text message or email. Sensitive personal information can include your driver's license number, social security number, password, and account numbers. Mobile device companies regularly provide updates to the mobile device operating system which include security patches. Check with your device manufacturer for information on how to get the most recent updates. Apple's iCloud service offers backup for your Apple devices with iOS5. Once you set up the service, it encrypts your data and backs up daily as long as you are connected to the Internet via Wi-Fi, or connected to a power source and have your screen locked.

Download secure applications: Be cautious about what applications you download. Prior to installing a new app, check the ratings and comments to be aware of what the app does and what information it may access on your mobile device.

Be aware that malware (viruses and Trojans) and fraudulent applications exist. Only download mobile applications from authorized application stores like the Apple App Store or the Android Market.

If you lose your mobile device: Phones are smaller and easier to lose than other devices; it's always best to know which actions to take if you lose any device. If you lose your mobile device, report the loss immediately to your carrier (if you've lost a cell phone) or your company (if you've lost a company-owned mobile device). If you believe your device has been lost or stolen, immediately go online and change passwords for financial and personal accounts to prevent any identity theft or fraud.

Other: Don't "jailbreak" or "root" your mobile device. Jail breaking or rooting means you are overriding some of the software features and limitations of the mobile device. Although this may be tempting, this leaves your device more vulnerable to attacks and compromises. It can also void warranties and render your phone completely unusable.

Q.No.3
As the internet can expose your e-business and customers to various risks, it is essential to ensure that adequate consideration is made in relation to the security of your computer system and online activities, in order to protect your business' assets, reputation, ability to generate an income, as well as your customers' privacy and your relationships with your customers. As the nature of e-business requires sending information between your business and customers, it is essential that ample protection is provided, as your business and customers may be exposed to risks such as theft, fraud, hackers, viruses, and denial of service, to name a few. By protecting and securing online activities, the risk of such threats adversely affecting your e-business is considerably reduced. It is important to ensure that electronic transfers of information and transactions are secure, as the information runs the risk of being intercepted and stolen by hackers, who maliciously and intentionally access data in order to steal information or cause harm and disruption to business operations. Identity theft and fraudulent conduct may occur through unsecure e-business activities. A virus is a malicious programming code that is usually received through email attachments, which causes harm to your computer, its programs and data. The effects of viruses can cause significant harm to the operations of your business, and can very easily go undetected before the harm is already done. Anti-virus software can help protect your computer system from viruses and malicious software. Another potential risk that your business may face is what is referred to as a denial of service. This occurs when there is an intentional overload of your network to disrupt operations and ultimately crash your server. Customers will not be able to access your website, thus loss of revenue may result. E-businessguide.gov.au has identified their Top 10 Internet Security Tips to protect your business and customers from the risks outlined above.

1. Develop a 'culture of security' Businesses need to have Internet security measures in place and make sure staffs are aware of, and follow, Internet security practices. 2. Install anti-virus software and keep it updated Anti-virus software scans and removes known viruses your computer may have contracted. It will help protect your computer against viruses, worms and Trojans. 3. Install a firewall to stop unauthorised access to your computer Firewalls work like a security guard to protect your computer from intruders. 4. Protect yourself from harmful emails Be cautious about opening emails from unknown or questionable sources. 5. Minimise spam While it is not possible to completely stop spam from entering your email box, you can take steps to reduce the amount. 6. Back-up your data Creating a copy of back-up of data is a sensible way to ensure that you can recover all of your business information from your computer or website quickly and easily. 7. Develop a system for secure passwords Creating effective passwords can provide an additional means of protecting the information on your computer. 8. Keep your software up-to-date If your software is out of date, you are more vulnerable. 9. Make sure your online banking is secure If you bank online you should follow security advice provided by your financial institution. 10. Develop and maintain a security policy You need to monitor and test security policies.

Q.No.4:
Online shopping is the process of buying goods and services from merchants who sell on the Internet. Since the emergence of the World Wide Web, merchants have sought to sell their products to people who surf the Internet. Shoppers can visit web stores from the comfort of their homes and shop as they sit in front of the computer. Consumers buy a variety of items from online stores. In fact, people can purchase just about anything from companies that provide their products online. Books, clothing, household appliances, toys, hardware, software, and health insurance are just some of the hundreds of products consumers can buy from an online store. Many people choose to conduct shopping online because of the convenience. For example, when a person shops at a brick-and-mortar store, she has to drive to the store, find a parking place, and walk throughout the store until she locates the products she needs. After finding the items she wants to purchase, she may often need to stand in long lines at the cash register.

ADVANTAGES: You can search for exactly what youre looking for. There are many online stores who specialize in a certain type of sofa or style that you may be looking for. If you love knowing the newest styles, or having unique pieces then online shopping makes it easier to do so. Instead of driving around wasting gas or spending hours on the bus in travel time you can visit all the stores that youre interested in. This eliminates time going from store to store to see what is available, and at what price. Easier to find discounts on the sofa youre looking for by Googling, going on EBay, Amazon and many other websites out there offering deals. Online stores usually offer online specials as well and there are multiple websites dedicated to sharing these deals with you.

DISADVANTAGES: You usually have to wait long periods of time to receive your sofa. Sometimes, this can even take up to a month or longer if being shipped from overseas. There could be delays on the delivery, or miscommunication and you cant go to the store or get in contact with someone face to face. Usually, there is no one to ease your frustration about any delays that occur. Shipping costs on your item can be extremely high in comparison to what you paid for the sofa, sometimes making the purchase not worth it. You do not get to test the product before you buy it. Sometimes looks can be deceiving. What might have looked beautifully to you in picture might not live up to your standards once received. Then what? If its an online store that doesnt have a local store in your area, returning the sofa will be a HUGE hassle. Make sure before you purchase online that you are clear on the stores return

policies. Make sure, that no matter how good the deal is that you have the option to return if need be. You wouldnt want to spend 500+ dollars on a sofa you cant bring backwould you? Another factor to remember about returns. You will have to pay the charge for shipping it back, repackaging, and stocking in most cases, unless its a manufacturing problem. People worry about fraud or theft with credit cards purchases. Make sure every website you shop from is security verified secure and protected and has this information displayed clearly on their website. Also, read the privacy policy on the website to see what they will do with your information. Do anything to make you feel secure, and know you're dealing with a reputable business. If something doesnt feel right it probably isnt. Hit your home button and restart your search.

Q.No.5:
Pervasive Computing:
Pervasive computing (or ubiquitous computing) is the idea of applying computing technology, especially control technology, to devices everywhere. This includes the deployment of smart grid technologies in utility meters, and extends beyond this to home automation of appliances such as furnaces/air conditioning, lighting, and beyond. The ultimate end of pervasive computing includes such fanciful technologies as a refrigerator which re-orders your groceries when you are running low, cell phones which double as remote controls of home theater systems or robotic vacuum cleaners, and more. Pervasive computing applications are comprised largely of embedded systems. Pervasive computing deployments may make use of mesh networking to provide connectivity.

Pervasive computing (also called ubiquitous computing) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices are completely connected and constantly available. Pervasive computing relies on the convergence of wireless technologies, advanced electronics and the Internet. The goal of researchers working in pervasive computing is to create smart products that communicate unobtrusively. The products are connected to the Internet and the data they generate is easily available. Privacy advocates are concerned about the "big brother is watching you" aspects of pervasive computing, but from a practical standpoint, most researchers feel it will improve efficiency. In a 1996 speech, Rick Belluzo, who was then executive VP and general manager of Hewlett-Packard, compared pervasive computing to electricity. He described it as being "the stage when we take computing for granted. We only notice its absence, rather than its presence." An example of a practical application of pervasive computing is the replacement of old electric meters with smart meters. In the past, electric meters had to be manually read by a company representative. Smart meters report usage in real-time over the Internet. They will also notify the power company when there is an outage, reset thermostats according to the homeowner's directives, send messages to display units in the home and regulate the water heater.

Device-to-Device Communication:
Device-to-device (D2D) communication underlaying a 3GPP LTE-Advanced cellular network is studied as an enabler of local services with limited interference impact on the primary cellular network. The approach of the study is a tight integration of D2D communication into an LTEAdvanced network. In particular, we propose mechanisms for D2D communication session setup and management involving procedures in the LTE System Architecture Evolution. Moreover, we present numerical results based on system simulations in an interference limited local area scenario. Our results show that D2D communication can increase the total throughput observed in the cell area. Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential advantages of D2D communications. In this article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Simulation results illustrate the viability of the proposed design. We consider Device-to-Device (D2D) communication underlaying cellular networks to improve local services. The system aims to optimize the throughput over the shared resources while fulfilling prioritized cellular service constraints. Optimum resource allocation and power control between the cellular and D2D connections that share the same resources are analyzed for different resource sharing modes. Optimality is discussed under practical constraints such as minimum and maximum spectral efficiency restrictions, and maximum transmit power or energy limitation. It is found that in most of the considered cases, optimum power control and resource allocation for the considered resource sharing modes can either be solved in closed form or searched from a finite set. The performance of the D2D underlay system is evaluated in both a single-cell scenario, and a Manhattan grid environment with multiple WINNER II A1 office buildings. The results show that by proper resource management, D2D communication can effectively improve the total throughput without generating harmful interference to cellular networks.

You might also like